Behavioral task
behavioral1
Sample
1384-989-0x0000000000400000-0x000000000040F000-memory.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1384-989-0x0000000000400000-0x000000000040F000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
1384-989-0x0000000000400000-0x000000000040F000-memory.dmp
-
Size
60KB
-
MD5
5c05a2cd05caa2ee3d6af08da3ce5e7c
-
SHA1
4c2ebb5e1eb347c9ce45662924be65e782e63218
-
SHA256
a9dddd514c4c8c9184fc84389755712dbd284401655fa0c81a394836a4082f48
-
SHA512
97450e2addf5408abc7fe5dac641f839ae1cc0464c1826fe4f9cb9d1fc53d92508e1bf0704ce4ad77cec4484d797af6612a464385609a3ea920e58603e1363f1
-
SSDEEP
768:TVcCo1dt4cybqx7P9vm9Rg6+E7apmW4Kmsk:T2t4cybq56O4K4
Malware Config
Extracted
raccoon
071a7b18a42c1cd94de2fc5bb0bbcaf2
http://85.209.134.122:80/
-
user_agent
DuckTales
Signatures
-
Raccoon Stealer V2 payload 1 IoCs
resource yara_rule sample family_raccoon_v2 -
Raccoon family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1384-989-0x0000000000400000-0x000000000040F000-memory.dmp
Files
-
1384-989-0x0000000000400000-0x000000000040F000-memory.dmp.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE